tm logo
IVA2S
Dead/Abandoned
ABANDONED - NO STATEMENT OF USE FILED

no statement of use filed

on 23 Mar 2020

Last Applicant/ Owned by

1301 Solana Blvd., Bldg. #2 Suite 2100

Westlake

TX

76262

Serial Number

88048899 filed on 23rd Jul 2018

Registration Number

N/A

Correspondent Address

Holly Pranger and Gail I. Nevius Abbas

HOLLY PRANGER AND GAIL I. NEVIUS ABBAS

88 GUY PLACE, SUITE 405

SAN FRANCISCO, CA 94105

Filing Basis

1. intent to use

2. intent to use current

Disclaimer

NO DATA

IVA2S

Computer software for monitoring and improving the security of, and detecting and protecting against cyber-attacks and threats directed at, computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; Data processing equipment, computers and computer software used for the verification and authentication of personal data; Computer softwa Read More

Classification Information


Class [009]
Computer & Software Products & Electrical & Scientific Products


Computer software for monitoring and improving the security of, and detecting and protecting against cyber-attacks and threats directed at, computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; Data processing equipment, computers and computer software used for the verification and authentication of personal data; Computer software for digital signatures in virtual data lockers for the purpose of cryptographic network security and data security functions on the Internet; Computer software, namely, software for data processing in connection with network security; Computer software for network security, system security, file security, data security, and personal identification security; Computer software for automating processes for authentication of identity using existing databases or partners in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication and verification of digital signatures in electronic transactions or communications, over the Internet and other computer networks

Class [042]
Computer & Software Services & Scientific Services


Computer system administration for others, namely, managing and administering a decentralized computer system for issuing identity credentials and documentation, verifying identity credentials and documentation, storing identity credentials and documentation, encrypting identity credentials and documentation, transmitting identity credentials and documentation, and tracking and monitoring transmission of identity credentials and documentation; Platform as a service (PAAS) featuring computer software platforms for enabling and managing identity credentials, identity information, identity documentation and verification of same and transmission of identity information and sensitive and/or confidential information; Providing online non-downloadable computer software for purposes of verifying individuals for computer security purposes; Providing online non-downloadable computer software for network security, system security, file security, data security, and personal identification security; Providing online non-downloadable software that gives users the ability to have an authenticated identity and identity credentials and documentation, for use in their access to and transmission of sensitive and/or confidential information; Software as Service (SAAS) services featuring software for network security, system security, file security, and data security; Software as Service (SAAS) services featuring software for management and monitoring of computer networks, systems, network connected devices, files, and data; Software as Service (SAAS) services featuring software for detection, analysis, reporting, and restoration of changes to computer networks, systems, network connected devices, applications, files, and data; Software as Service (SAAS) services featuring software for managing analyzing, and optimizing hardware and software in an information technology environment; providing online, non-downloadable software for assessing network information security vulnerability and risk; providing online, non-downloadable software for scanning and penetration testing of computers and networks to assess the risk of information security vulnerabilities, and to manage and resolve information security vulnerabilities

Mark Details


Serial Number

No 88048899

Mark Type

No Service Mark

Attorney Docket Number

No

44D Filed

No

44D Current

No

44E filed

No

44E Current

No

66A Filed

No

66A Current

No

Current Basis

No

No Basis

No

Legal History


Show more

Status DateAction Taken
23rd Mar 2020ABANDONMENT - NO USE STATEMENT FILED
23rd Mar 2020ABANDONMENT NOTICE E-MAILED - NO USE STATEMENT FILED
20th Aug 2019NOA E-MAILED - SOU REQUIRED FROM APPLICANT
25th Jun 2019OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
25th Jun 2019PUBLISHED FOR OPPOSITION
05th Jun 2019NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
23rd May 2019APPROVED FOR PUB - PRINCIPAL REGISTER
22nd May 2019TEAS/EMAIL CORRESPONDENCE ENTERED
22nd May 2019CORRESPONDENCE RECEIVED IN LAW OFFICE
21st May 2019ASSIGNED TO LIE